Главная
Study mode:
on
1
Introduction
2
About me
3
Metasploit
4
Why do we care
5
Vulnerabilities
6
Common Vulnerability Classes
7
Null Pointer Dereference
8
Use After Pointer
9
Reliable Code Execution
10
Conditioning
11
Useful Object
12
Mitigation Technologies
13
NoPage Mapping
14
Kernel Exploits
15
Ruby Implementation
16
C Implementation
17
Reliability
18
Corrupted Structures
19
Token Reference Count
20
Returning Control
21
Shell Code
22
Closing Thoughts
23
Cool Prizes
24
Further Reading
25
Thank You
Description:
Explore Windows kernel exploitation techniques using Metasploit in this 51-minute conference talk from BSides Cleveland 2015. Delve into common vulnerability classes, including null pointer dereference and use-after-free, while learning about mitigation technologies and reliable code execution methods. Gain insights into kernel exploits through Ruby and C implementations, and understand the intricacies of corrupted structures and token reference counts. Discover practical shell code techniques and acquire valuable knowledge for further exploration in the field of Windows kernel exploitation.

Metasploit Windows Kernel Exploitation

Add to list